Network Time Protocol daemon (version 4)
The Network Time Protocol (NTP) is used to synchronize the time of a
computer client or server to another server or reference time source,
such as a radio, satellite receiver, or modem.
Ntpd is an operating system daemon that sets and maintains the system
time-of-day synchronized with Internet standard time servers.
- Developed at network:time
- Sources inherited from project openSUSE:Factory
-
2
derived packages
- Download package
-
Checkout Package
osc -A https://api.opensuse.org checkout openSUSE:Slowroll:Base:1/ntp && cd $_
- Create Badge
Refresh
Refresh
Source Files
Filename | Size | Changed |
---|---|---|
MOD_NANO.diff | 0000000479 479 Bytes | |
NTP-FAQ-3.4.tar.bz2 | 0000271146 265 KB | |
README.SUSE | 0000000519 519 Bytes | |
bnc#506908.diff | 0000000391 391 Bytes | |
bnc#574885.diff | 0000000637 637 Bytes | |
conf.logrotate.ntp | 0000000187 187 Bytes | |
conf.ntp-wait.service | 0000000398 398 Bytes | |
conf.ntp.conf | 0000002964 2.89 KB | |
conf.ntp.reg | 0000000310 310 Bytes | |
conf.ntpd.service | 0000000410 410 Bytes | |
conf.start-ntpd | 0000005594 5.46 KB | |
conf.sysconfig.ntp | 0000001937 1.89 KB | |
conf.sysconfig.syslog-ntp | 0000000430 430 Bytes | |
ntp-4.2.6p2-ntpq-speedup-782060.patch | 0000000701 701 Bytes | |
ntp-4.2.6p2-seed_file.patch | 0000000577 577 Bytes | |
ntp-4.2.8p11.tar.gz | 0007076566 6.75 MB | |
ntp-ENOBUFS.patch | 0000000691 691 Bytes | |
ntp-daemonize.patch | 0000001909 1.86 KB | |
ntp-move-kod-file.patch | 0000004008 3.91 KB | |
ntp-netlink.patch | 0000000518 518 Bytes | |
ntp-pathfind.patch | 0000000794 794 Bytes | |
ntp-reproducible.patch | 0000000811 811 Bytes | |
ntp-segfault_on_invalid_device.patch | 0000000452 452 Bytes | |
ntp-sntp-dst.patch | 0000001743 1.7 KB | |
ntp-sntp-libevent.patch | 0000004797 4.68 KB | |
ntp-strcat.patch | 0000000644 644 Bytes | |
ntp-usrgrp-resolver.patch | 0000010124 9.89 KB | |
ntp.NetworkManager | 0000000368 368 Bytes | |
ntp.changes | 0000076550 74.8 KB | |
ntp.firewall | 0000000343 343 Bytes | |
ntp.spec | 0000011937 11.7 KB | |
ntp.xml | 0000002906 2.84 KB | |
ntptime.8.gz | 0000000662 662 Bytes |
Revision 113 (latest revision is 140)
Dominique Leuenberger (dimstar_suse)
accepted
request 586702
from
Reinhard Max (rmax)
(revision 113)
- Update to 4.2.8p11 (bsc#1082210): * CVE-2016-1549: Sybil vulnerability: ephemeral association attack. While fixed in ntp-4.2.8p7, there are significant additional protections for this issue in 4.2.8p11. * CVE-2018-7182, bsc#1083426: ctl_getitem(): buffer read overrun leads to undefined behavior and information leak. * CVE-2018-7170, bsc#1083424: Multiple authenticated ephemeral associations. * CVE-2018-7184, bsc#1083422: Interleaved symmetric mode cannot recover from bad state. * CVE-2018-7185, bsc#1083420: Unauthenticated packet can reset authenticated interleaved association. * CVE-2018-7183, bsc#1083417: ntpq:decodearr() can write beyond its buffer limit. * Obsoletes these patches: ntp-sntp-a.patch, ntp-warnings.patch - Remove dead code from conf.start-ntpd (bsc#1082063). - Don't use libevent's cached time stamps in sntp. (bsc#1077445, ntp-sntp-libevent.patch)
Comments 0